2017 Theory of Cryptography for Cybersecurity

Font size  SML

Register update notification mail Add to favorite lecture list
Academic unit or major
School of Computing
Instructor(s)
Xagawa Keita  Nishimaki Ryo  Matsuda Takahiro  Tanaka Keisuke 
Class Format
Lecture     
Media-enhanced courses
Day/Period(Room No.)
Mon5-6(W834)  Thr5-6(W834)  
Group
-
Course number
XCO.T474
Credits
2
Academic year
2017
Offered quarter
3Q
Syllabus updated
2017/3/21
Lecture notes updated
-
Language used
Japanese
Access Index

Course description and aims

Cybersecurity is important for our daily lives including various types of activities. There is a growing demand for students who can be researchers and engineers capable of understanding cybersecurity.
In order to satisfy this demand, Tokyo Tech has launched Progressive Graduate Minor in Cybersecurity in April, 2016. We design the curriculum of Progressive Graduate Minor in Cybersecurity in collaboration with NRI as the core, also with Rakuten, NTT, AIST, and NISC. The following six courses are organized in School of Computing: Foundation of Cybersecurity (1Q, 2-0-0), Theory of Cryptography for Cybersecurity (3Q, 2-0-0), Cybersecurity Governance (3Q, 1-1-0), Attack and Defense on Cybersecurity I (2Q, 1-1-0), Attack and Defense on Cybersecurity II (3Q, 1-1-0), and Attack and Defense on Cybersecurity III (4Q, 1-1-0).
This course is one of the core courses in this minor. This course aims to help students to understand the theory of cryptography as a fundamental element of cybersecurity. In particular, this course mainly gives models, schemes, and security proofs appeared in the theory of cryptography related to cybersecurity.

Student learning outcomes

By the end of this course, students will be able to understand:
1) models in cryptography as a fundamental element of cybersecurity
2) systems and algorithms in cryptography as a fundamental element of cybersecurity
3) techniques for security proofs in cryptography as a fundamental element of cybersecurity.

Keywords

cryptography, security, information security, cybersecurity, security proof

Competencies that will be developed

Specialist skills Intercultural skills Communication skills Critical thinking skills Practical and/or problem-solving skills

Class flow

The class offers a standard type of lecture. The instructors give the small exams solved in classes or as homework assignments.

Course schedule/Required learning

  Course schedule Required learning
Class 1 Overview of this course, and models for public-key encryption. Understand the notions of the models.
Class 2 Basic schemes for public-key encryption. Understand the algorithms for the schemes.
Class 3 Security proofs of basic schemes for public-key encryption. Understand the methods of the security proofs.
Class 4 Advanced schemes for public-key encryption. Understand the algorithms for the schemes.
Class 5 Security proofs of advanced schemes for public-key encryption. Understand the methods of the security proofs.
Class 6 Models for signature. Understand the notions of the models.
Class 7 Basic schemes for signature. Understand the algorithms for the schemes.
Class 8 Security proofs of basic schemes for signature. Understand the methods of the security proofs.
Class 9 Advanced schemes for signature. Understand the algorithms for the schemes.
Class 10 Security proofs of advanced schemes for signature. Understand the methods of the security proofs.
Class 11 Models for public-key encryption with special properties. Understand the notions of the models.
Class 12 Basic schemes for public-key encryption with special properties. Understand the algorithms for the schemes.
Class 13 Security proofs of basic schemes for public-key encryption with special properties. Understand the methods of the security proofs.
Class 14 Advanced schemes for public-key encryption with special properties. Understand the algorithms for the schemes.
Class 15 Security proofs of advanced schemes for public-key encryption with special properties. Understand the methods of the security proofs.

Textbook(s)

Textbooks will be used in this course.

Reference books, course materials, etc.

References will be announced in the classes.

Assessment criteria and methods

The evaluation consists of the small exams solved in classes or as homework assignments. There will be approximately six small exams. The weights of the scores of the small exams are equal. The total score is calculated by adding all of the scores.

Related courses

  • XCO.T473 : Foundation of Cybersecurity
  • XCO.T478 : Cybersecurity Governance
  • XCO.T475 : Attack and Defense on Cybersecurity I
  • XCO.T476 : Attack and Defense on Cybersecurity II
  • XCO.T477 : Attack and Defense on Cybersecurity III

Prerequisites (i.e., required knowledge, skills, courses, etc.)

None. However, the knowledge on the basic notions of computer science can help students to understand the contents of the course smoothly.

Contact information (e-mail and phone)    Notice : Please replace from "[at]" to "@"(half-width character).

keisuke[at]is.titech.ac.jp

Office hours

Appointment by e-mail is required.

Page Top